iOS and the new IT.

Progressive IT organizations are prioritizing productivity by empowering employees with iPhone and iPad. Apple makes it easy to manage iOS devices on corporate networks so that IT can focus on what’s most important — helping employees transform the way they work.

Secure by design.

iOS is designed with advanced security technologies that offer enterprise-grade protection for corporate data while maintaining a great user experience. This comprehensive approach to security allows for end-to-end control of devices, data, and apps and keeps employees focused on being productive.

iOS Security paper.

Learn about advanced security features for iOS devices.

Download the iOS Security paper

Secure hardware, software, and services.

iOS devices seamlessly integrate hardware, software, and services that work together for a secure and transparent user experience. This lets IT protect the entire system — without impacting the great capabilities that make iOS incredibly easy to work with.

Security out of the box.

The moment an iOS device starts up, all core components must satisfy a series of checkpoints. This confirms the device is validated and the lowest levels of hardware and software remain tamper-free. Touch ID works with Secure Enclave, encrypted memory built into the hardware, so users can securely access their devices quickly and easily.

An up-to-date platform.

Apple not only designs trusted hardware, but also assures the operating system software is protected by regularly releasing updates to address any emerging security concerns for all supported devices, simultaneously. iOS also has a process in place that prevents devices from being downgraded to older versions lacking the latest security updates.

Secure cloud services.

The iOS security architecture even extends to cloud services, so users get more utility and productivity out of their devices. Built with the same data protection goals in mind, services like iMessage, FaceTime, Siri, iCloud, iCloud Backup, and iCloud Keychain each use their own powerful security architecture without compromising the user experience.

Secure data.

We believe that protecting corporate data is as important as protecting user privacy. iOS works tirelessly to do both — ensuring corporate and personal data is managed and secured seamlessly.

Secure at rest.

iOS ensures an even higher level of protection for apps that interact with corporate data by encrypting each file with a 256-bit key. And the entire system can quickly be erased using remote wipe. Apps use this file-level encryption method by default such as Mail, Calendar, Contacts, Notes, Reminders, iBooks, iMessage, and all App Store and custom in-house apps.

Safe in transit.

iOS utilizes proven technologies to seamlessly and securely connect to corporate systems — making sure users are authorized and data is protected as it travels over a network. This includes support for Internet standards like SSL and TLS, Wi-Fi standards such as WPA2 Enterprise, and a broad range of VPN solutions. iOS also supports secure authentication methods like certificates and Kerberos.

Protected and seamless.

iOS has comprehensive tools built in that give IT full control to manage corporate data. At the same time, the iOS management framework keeps all personal data private. Other platforms often require users to juggle multiple personas or copies of the same app. iOS is able to manage corporate data behind the scenes and still maintain a seamless user experience.

Secure apps.

iOS is designed to proactively prevent app security issues and reduce the potential damage of attacks. Features like mandatory code signing, runtime protections, app sandboxing, entitlement declarations, and the App Store review process ensure the integrity of iOS apps.

In-depth data integrity.

iOS is designed to seamlessly protect app data. If a third-party app needs to access information other than its own, it does so only by using application programming interfaces (APIs) and services provided by iOS. System files and resources are also shielded from a user's apps.

A protected ecosystem.

Whether deploying off-the-shelf or custom-built apps, IT can be assured apps are valid and not malicious. As part of the security ecosystem, Apple requires a Developer Program certificate, review of App Store submissions, an in-house app provisioning process, as well as mandatory code signing.

Secure development.

iOS provides extensive tools and methods for securing apps. From the keychain services framework in the SDK, to the Touch ID framework for third-party apps, enterprise single sign-on, and managed apps with MDM, developers and IT have the best tools to deliver secure apps for users.